General

  • Target

    702331dbfe2a2c8e3fcdce4f255fd70e515c645e681011afb02c1a93362051f2

  • Size

    262KB

  • Sample

    230607-ptqhyaba5z

  • MD5

    19b3695cbf046c2f027c3b13c17ac383

  • SHA1

    1be6d3d9296f704783335ffa5225854bef7395e2

  • SHA256

    702331dbfe2a2c8e3fcdce4f255fd70e515c645e681011afb02c1a93362051f2

  • SHA512

    c238d591a3d4fb6b46e414eafd7ce4305ef604422437e44c4ca12a22b1b397a3b25821560ad52070505d89f2c89f3f6e15e3d25718e99ff31eb1e4f02381954d

  • SSDEEP

    3072:Ox/qx1OuyRyXFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2SUHcj/:a/qx1aEFaQ7W05AEezbMPZFzAy2Sc

Malware Config

Extracted

Family

redline

Botnet

sheron

C2

83.97.73.129:19068

Attributes
  • auth_value

    2d067e7e2372227d3a03b335260112e9

Targets

    • Target

      702331dbfe2a2c8e3fcdce4f255fd70e515c645e681011afb02c1a93362051f2

    • Size

      262KB

    • MD5

      19b3695cbf046c2f027c3b13c17ac383

    • SHA1

      1be6d3d9296f704783335ffa5225854bef7395e2

    • SHA256

      702331dbfe2a2c8e3fcdce4f255fd70e515c645e681011afb02c1a93362051f2

    • SHA512

      c238d591a3d4fb6b46e414eafd7ce4305ef604422437e44c4ca12a22b1b397a3b25821560ad52070505d89f2c89f3f6e15e3d25718e99ff31eb1e4f02381954d

    • SSDEEP

      3072:Ox/qx1OuyRyXFaQ7RQ05CTEezbClXv8r8+oFe6gobFHFzA+E+2SUHcj/:a/qx1aEFaQ7W05AEezbMPZFzAy2Sc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks